Amazon Linux 1 Security Advisory: ALAS-2014-277
Advisory Release Date: 2014-01-14 16:16 Pacific
Advisory Updated Date: 2014-09-16 22:19 Pacific
An integer overflow, which led to a heap-based buffer overflow, was found in the way X.Org server handled trapezoids. A malicious, authorized client could use this flaw to crash the X.Org server or, potentially, execute arbitrary code with root privileges. (CVE-2013-6424)
Affected Packages:
xorg-x11-server
Issue Correction:
Run yum update xorg-x11-server to update your system.
noarch:
xorg-x11-server-source-1.13.0-23.1.36.amzn1.noarch
src:
xorg-x11-server-1.13.0-23.1.36.amzn1.src
x86_64:
xorg-x11-server-devel-1.13.0-23.1.36.amzn1.x86_64
xorg-x11-server-Xephyr-1.13.0-23.1.36.amzn1.x86_64
xorg-x11-server-debuginfo-1.13.0-23.1.36.amzn1.x86_64
xorg-x11-server-common-1.13.0-23.1.36.amzn1.x86_64
xorg-x11-server-Xnest-1.13.0-23.1.36.amzn1.x86_64
xorg-x11-server-Xorg-1.13.0-23.1.36.amzn1.x86_64
xorg-x11-server-Xvfb-1.13.0-23.1.36.amzn1.x86_64
xorg-x11-server-Xdmx-1.13.0-23.1.36.amzn1.x86_64